Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 743 (0.034 secs)
You searched for: (collection:hackercons OR mediatype:hackercons) AND -mediatype:collection
[1] 2 3 4 5 6 7 8 9 10 11     Next    Last
[movies]ShmooCon 2014 - Controlling USB Flash Drive Controllers: Expose of Hidden Features - Richard Harman
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name brands" on the market...
Downloads: 4,624
[movies]Derbycon 2012 Day 3
Derbycon 2012 Day 3
Keywords: derbycon; hacking; security; louisville
Downloads: 3,809
[movies]OHM2013: Breaking The Taboo (With QA) (film screening)
Screening of cult film "Breaking the Taboo" - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation, Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals...
Keywords: OHM2013; talk; Amanda Fielding; Annie Machon; John Gilmore; screening; beckley foundation; LEAP; Law Enforcement Against Prohibition; prohibition; drug; drugs; narcotics
Downloads: 333
[audio]When the Party Van is at your doorstep - joepie91 (Sven Slootweg)
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; raid
Downloads: 437
[movies]26c3-3668-en-hacker jeopardy
26c3-3668-en-hacker jeopardy
Downloads: 19
[movies]SQL Server Hacking By Jeremy Druin
SQL Server Hacking By Jeremy Druin as recorded as the Kentuckiana ISSA/
Keywords: sql; hacking; louisville
Downloads: 1,137
[movies]26c3-3654-en-gsm srsly
26c3-3654-en-gsm srsly
Downloads: 38
[movies]26c3-3555-en-sccp hacking attacking the ss7 and sigtran applications one step further and mapping the phone system
26c3-3555-en-sccp hacking attacking the ss7 and sigtran applications one step further and mapping the phone system
Downloads: 33
[movies]OHM2013: Philippe Langlois - Rooting The HLRs Mobile And Critical Infrastructure Insecurity
Nothing's wrong with Telecom Security? No, not according to vendors, not according to some operators. Why? Because most of them benefit from the relative absence of awareness of its actual lack of security. SS7 is totally unauthenticated. Even Diameter, which is recent, doesn't show much in term of message authentication. Supporting systems are unpatched and using default. Telecom applications are developed without security in mind...
Keywords: OHM2013; talk; HLR; SS7; HSS; MME; MSC; ATCA; IPsec; GSMA; GSM; 3GPP; LTE
Downloads: 79
[movies]Notacon 9 Videos
Notacon 9 Videos
Keywords: hacker; maker; notacon
Downloads: 423
[movies]26c3-3647-de-ckan apt-get for the debian of data
26c3-3647-de-ckan apt-get for the debian of data
Downloads: 415
[movies]Outerz0ne 2009
Outerz0ne 2009 hacker con Uploading it here after moving it from Blip. Just want it to be preserved.
Keywords: hacker; con; security
Downloads: 283
[audio]Botnets: Ransomware, Malware and Stuff - Julie Wolf

Downloads: 9
[movies]One Last Time: The Hacking/Phreaking History Primer - Jason Scott Sadofsky
Presented at The Last Hope, Hotel Pennsylvania, New York City, NY. Historian Jason Scott covers a broad range of hacker history subjects, focusing on providing the tools for understanding the context of hacking and computer history. Subjects covered include 1800-era hacker cons, myths in the Hacker "story", names and events likely forgotten, and some of the touchstones of what hackers consider their lore.
Keywords: Hacking; phreaking; jason scott
Downloads: 999
[movies]Derbycon 2012 Day 3 A
Derbycon 2012 Day 3
Keywords: derbycon; hacking; security; louisville
Downloads: 2,410
[movies]ShmooCon 2014 - Introducing idb - Simplified Blackbox iOS App Pentesting - Daniel A. Mayer
Introducing idb - Simplified Blackbox iOS App Pentesting Daniel A. Mayer More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process communication, network communications, and user input handling as seen in real-world applications. To assist the community in assessing security risks of mobile apps, we introduce a new tool called 'idb' and show how it can be ...
Downloads: 325
[movies]Bsides Cleveland 2012 BsidesCLE
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
Keywords: security; hacking
Downloads: 1,052 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized
Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized http://www.irongeek.com/i.php?page=videos/intro-to-scanning-nmap-hping-amap-tcpdump-metasploit-jeremy-druin
Keywords: hacking; security
Downloads: 1,851
[movies]Hack3rcon 3 (2012)
Videos of the talks from Hack3rcon 3 (2012)
Keywords: hacking; security; hack3rcon
Downloads: 826
[texts]110 Applied Data Mining
110 Applied Data Mining
Keywords: mining; data; features; rule; applied; association; introduction; dhcwg; rule mining; data mining; association rule; applied data; mining introduction; introduction features; features exploration; mining data
Downloads: 27
[movies]Trojans and Botnets and Malware, Oh My! - Lance James
In 2003, the concept of the age-old megavirus changed. Agobot, Sasser, Berbew, Haxdoor, mitgleider, and many more that some will never hear about have been flying across IDS systems for the past two years. This type of malicious software contains certain unique elements and arrive in multiple variants enabling a more clandestine-like activity, as well as prolonging the lifespan of effectivity thwarting detection by AV vendors...
Downloads: 42
[audio]Open Source Information Gathering - Chris Gates

Downloads: 8
[movies]27c3-4339-en-openleaks
27c3-4339-en-openleaks
Downloads: 22
[movies]ShmooCon2014 - Arms Race: The Story of (In)-Secure Bootloaders - Lee Harrison and Kang Li
Arms Race: The Story of (In)-Secure Bootloaders Lee Harrison and Kang Li Secure boot is the process that ensures the critical parts of software (e.g. kernel) running on a device are authorized and have not been tampered with. Many wireless service providers prefer to have a locked down version of their smartphones that can only boot the official kernel, and do not allow loading customized systems developed by users...
Downloads: 486
[movies]26c3-3557-de-vom kreationismus zum kollektivismus
26c3-3557-de-vom kreationismus zum kollektivismus
Downloads: 33
[movies]OHM2013: Krunch - Datamining A Cloud That Wasnt Meant To Be Public How I Get My Free Amateur P0rn
This short talk describes an undocumented feature of a certain web storage provider that allows some operations typical users of the service would probably not expect. We will explain how the feature was discovered, how it was exploited and what kind of data we have been able to retrieve.
Keywords: OHM2013; krunch; datamining; data mining; cloud; talk
Downloads: 33
[movies]Taking Tracking Mainstream - Andrew 'Necros' Sega

Downloads: 14
[movies]OHM2013: Henry Story/bblfish - The Secure Social Web
We will give a very quick overview of progress in developing the global social web using linked data, WebID authentication and Web Access Control.Event program page: https://program.ohm2013.org/event/98.html
Keywords: OHM2013; Henry Story; bblfish; social web; secure; security; WebID authentication; WebID; Web Access Control; WAC; linked data
Downloads: 12
[movies]OHM2013: Ot van Daalen - Bits of Freedom: four years after HAR2009
Bits of Freedom got relaunched at HAR2009. Now that four years have passed we would like to provide you with a summary of what we did in the meantime, but also what we are working on right now.Program event page: https://program.ohm2013.org/event/89.html
Keywords: OHM2013; talk; freedom; Ot van Dalen; HAR; HAR2009; Hacking at Random
Downloads: 12
[movies]ShmooCon 2014 - Timing-Based Attestation: Sexy Defense, or the Sexiest? - Xeno Kovah, Corey Kallenberg, and John Butterworth
Timing-Based Attestation: Sexy Defense, or the Sexiest? Xeno Kovah, Corey Kallenberg, and John Butterworth What if I told you it's possible to ask a drunk person if he's drunk - and get an accurate answer, by measuring the reaction time? What if I told you it's possible to design security software under the assumption that the attacker has the same privileges as the defender, and the attacker can scribble over and modify the defender's code as much as he wants, but he'll still get caught? This i...
Downloads: 124
[movies]Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC) - Adrian Crenshaw
Demo video on Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC)
Keywords: OpenSSL; AES 128; ECB; CBC
Downloads: 924
[movies]OHM2013: Tim Becker - Another Rambling About EMV
A brief introduction to EMV, the protocol spoken between smart card based credit cards and terminals. A mixture of plastic and RF, bits, bytes and anecdotes, based around a single payment transaction performed live on stage. My talk will be an introduction helping beginners to start playing around with (chip based & contactless) credit cards and provide some deeper insight for people with knowledge of chip card but little knowledge of EMV...
Keywords: OHM2013; talk; EMV; Tim Becker; Chip&PIN; visa; mastercard; 29C3
Downloads: 41
[movies]066 Bluetooth Hacking
066 Bluetooth Hacking
Downloads: 120
[movies]OHM2013: katha - Modeling and Control of Rotary Winged Unmanned Aerial Vehicles
The talk will cover different aspects of the autonomous flight of rotary winged aerial vehicles. We'll discuss the nonlinear model of the unmanned aerial vehicle (UAV), controller design, as well as hardware requirements, implementation of the control algorithm and gps-aided inertial navigation system. The topic will be divided into two parts. The first one will focus on a broader audience covering mainly the aspects of hardware design and navigational system with a small outlook towards autonom...
Keywords: OHM2013; talk; UAV; Unmanned aerial vehicle; controller design; design; gps; hardware design; navigation; navigational system; autonomous flight
Downloads: 14
[movies]Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2
Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2 from Jeremy Druin
Keywords: hacking; security. owasp; pen-testing
Downloads: 1,662
[movies]wth wifi and 500km 88
wth wifi and 500km 88
Downloads: 16
[movies]Pen-testing practice in a box :How to assemble a virtual network
http://www.irongeek.com/i.php?page=videos/pen-testing-practice-in-a-box-how-to-assemble-a-virtual-network This is a re-upload, the last one had audio issues Presenter: Jeremy Druin Topics Virtual Box Installation Installing virtual machines Configuring virtual networks - bridged, nat, hostonly USB devices in virtual machines Wireless networks in virtual machines Installing Guest Additions How to install Mutillidae in Windows on XAMPP How to install Mutillidae in Linux Samurai Video Tutorials: ww...
Keywords: hacking; mutillidae; owasp; security
Downloads: 1,491
[movies]OHM2013: Digital Whistleblowing with GlobaLeaks
We'll introduce Digital Whistleblowing, how it's effectively used and adapted to different context: Investigative Journalism, Activism, Corporations and Governments. The new GlobaLeaks 0.2 software will be presented with a show case of design, security principle and tips on how to use it or hack it. Digital Whistleblowing with represent the next frontier for hackers, investigative journalists and the society at large to spot unethical practices of humans...
Keywords: OHM2013; talk; GlobaLeaks; digital whistleblowing; whistleblowing; investigative journalism; activism
Downloads: 17
[movies]OHM2013: Felicitus - Solar Powered Autonomous Routers
Considerations on how to build a solar powered autonomous router, from planning phase to the final project. In this talk I'll go through the considerations on how to plan and build a solar powered autonomous router. This includes calculations on the solar panel size, which components the setup needs, how the system can do self-monitoring and what you can possibly do with such a system. This talk is also suitable to learn the basics for stand-alone photo-voltaic systems; you don't necessarily pow...
Keywords: OHM2013; talk; solar; solar power; router; autonomous; routing; SolarWind; Felicitus
Downloads: 13
[movies]Jason Scott's Presentation Presentation - Jason Scott
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice remai...
Keywords: presentation; jason scott; notacon
Downloads: 1,989 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]OHM2013: Ajin Abraham - Abusing Exploiting and Pwning with Firefox Add-ons
The talk is about abusing and exploiting Firefox add-on Security model and explains how JavaScript functions, XPCOM and XPConnect interfaces, technologies like CORS and WebSocket, Session storing and full privilege execution can be abused by a hacker for malicious purposes. The widely popular browser add-ons can be targeted by hackers to implement new malicious attack vectors resulting in confidential data theft and full system compromise...
Keywords: OHM2013; talk; Ajin Abraham; Firefox; Javascript; security; XPCOM; Mozilla Foundation; add-on; XPConnect; CORS; WebSocket; keylogger; DDoS
Downloads: 291
[movies]OHM2013: Merlijn Wajer - Hart Voor Internetvrijheid
"Hart voor internetvrijheid" is a foundation setup to help in circumventing censorship online. Our primary goal is to run a bunch of Tor nodes. We are a partner at; https://www.torservers.net/partners.html
Keywords: OHM2013; talk; lightning talk; Merlijn Wajer; Hart voor internetvrijheid; TOR; The Onion Router; censorship
Downloads: 21
[movies]saal mp7 og - 2012-05-20 13 00 - efi rootkits - andreas galauner - 35
saal mp7 og - 2012-05-20 13 00 - efi rootkits - andreas galauner - 35
Downloads: 11
[movies]Techniques for 4kb Intro Development - S-Tec and Dave 'Polaris' Valentine
The demoscene emerged from the fusion of art and technical innovation. Nothing quite captures this spirit as much as the challenge of creating a full production with music, sound and graphics in 4096 bytes or less. This seminar of 4kb intro development will contrast standard demo development to 4kb intro development, and provide a brief synopsis of various tips for 4kb intro development. While this is a technical discussion, it will cover basic concepts so it will be accessible to a beginner as ...
Downloads: 68
[movies]26c3-3579-en-photography and the art of doing it wrong iProd
26c3-3579-en-photography and the art of doing it wrong iProd
Downloads: 9
[texts]065 Grundlagen des Compilerdesign
065 Grundlagen des Compilerdesign
Keywords: code; generators; parser; compiler; lexer; parsers; spl; urls; gmbh; overview; code generators; stack machines; technologies gmbh; spl project; complex code; generators tools; parsers urls; parser code; compiler stack; tools complex
Downloads: 19
[audio]Chaos Communications Congress 1998 Audio

Downloads: 4
[movies]2007 BlackHat Vegas-V3-Stewart-Windows Kernel Perl Hacker.mp4
2007 BlackHat Vegas-V3-Stewart-Windows Kernel Perl Hacker.mp4
Downloads: 12
[audio]Chaosvpn - a vpn to connect hackers - mc.fly, Guus Sliepen
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; vpn
Downloads: 38
[texts]187 Einfuehrung in die Rastersondenmikroskopie
187 Einfuehrung in die Rastersondenmikroskopie
Keywords: stm; afm; topografiner; schemazeichnung; http; controller; lever; diamond; feedback; spermium
Downloads: 15
[1] 2 3 4 5 6 7 8 9 10 11     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio
texts

Terms of Use (10 Mar 2001)